Hacking Tools

Hawker : The Comprehensive OSINT Toolkit For Cybersecurity Professionals

Don’t worry if there are any bugs in the tool, we will try to fix them.

This OSINT tool has been created to assist cybersecurity professionals, law enforcement, and security researchers in conducting legal and ethical investigations on email addresses, in compliance with applicable laws.

Any malicious use, such as harassment, fraud, or illegal activities, is strictly prohibited.

TOR66

  • I have the impression that tor66.org has an error, if on tor66 you have an error it’s probably the site that no longer responds!

Important

  • A big thank you to @DarkWebInformer Don’t hesitate to follow him on his Twitter and Linkedin
  • Thank you to everyone who liked my tool, I love you!

Options

[Commands]
     [01] Find webcam URLs
     [02] Find information about an email
     [03] Find information about a person
     [04] Find information about a Phone Number
     [05] Find information about an IP address
     [06] Find Bitcoin Address Information
     [07] Find information on a website
     [99] Clear the screen

Installing Hawker


git clone https://github.com/RetrO-M/Hawker
cd Hawker

Install Python modules 
 - pip install -r requirements.txt

Start the program
 - python main.py

Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

Things to Do After Installing Ubuntu 26.04 LTS for a Fast, Secure Setup

Installing Ubuntu 26.04 LTS is only the first step toward building a smooth, secure, and…

1 day ago

How to Prevent Software Supply Chain Attacks

What is a Software Supply Chain Attack? A software supply chain attack occurs when a…

1 month ago

How UDP Works and Why It Is So Fast

When people ask how UDP works, the simplest answer is this: UDP sends data quickly…

2 months ago

How EDR Killers Bypass Security Tools

Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…

2 months ago

AI-Generated Malware Campaign Scales Threats Through Vibe Coding Techniques

A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…

2 months ago

How Does a Firewall Work Step by Step

How Does a Firewall Work Step by Step? What Is a Firewall and How Does…

2 months ago